Skip to search formSkip to main contentSkip to account menu

Trust boundary

Trust boundary is a term in computer science and security used to describe a boundary where program data or execution changes its level of "trust… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Aiming at the threats faced by embedded systems, using trusted computing technology to solve embedded security equipment problems… 
2016
2016
With the coming of information era, cloud computing has become a strong pillar for important management, storage, etc. in modern… 
2010
2010
  • R. Kantola
  • 2010
  • Corpus ID: 14089913
A Network Address Translator allows hosts in a private address space to communicate with servers in the public Internet. There is… 
Review
2008
Review
2008
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to… 
2003
2003
  • J. Shapiro
  • 2003
  • Corpus ID: 638543
Recent advances in interprocess communication (IPC) performance have been exclusively based on thread-migrating IPC designs… 
2002
2002
Handling exceptions, errors, and alternative flows are a critical part of defining good use cases and designing good software… 
2000
2000
  • 2000
  • Corpus ID: 166817940
The current Internet assumes the b st-effortservice model. In this model, the network allocates bandwidth among all the…